Can you hack it? Managing the cybersecurity challenge

42
Can you hack it?
Managing the cybersecurity challenge
To secure cyberspace, technology alone is not enough. Strong management
plays an equally important role.
John Dowdy,
Joseph Hubback,
Dennis Layton,
and James Solyom
Cyberspace, according to the US government, is
Europe has similar concerns: the United Kingdom’s
“the interdependent network of information
National Security Strategy, for example, cites
technology infrastructures,” including “the
“hostile attacks upon UK cyberspace by other states
Internet, telecommunications networks, computer
and large-scale cyber crime” as a Tier 1 threat.3
systems, and embedded processors and
controllers in critical industries.”1 Governments
1 National Security
Presidential Directive 54
and Homeland Security
Presidential Directive 23,
as per Cyberspace
policy review, p. 1.
2 Ibid.
3 A strong Britain in an
age of uncertainty:
The national security
strategy, UK government,
October 2010.
Yet governments today have a poor understanding
and corporations worldwide are beginning
of the cybersecurity landscape and the scale of
to recognize the fact that securing cyberspace—
the challenge. One reason for this lack of clarity is
protecting its confidentiality, integrity, and
that the term “cyberattack” is often used to
availability—is of paramount importance.
describe everything from low-probability cata-
In its 2009 cyberspace policy review, the Obama
infrastructure) to higher-frequency threats (such
strophic events (such as devastating attacks on
administration asserted that “threats to
as cyberespionage and intellectual-property
cyberspace pose one of the most serious economic
theft). In addition, there is a dearth of reliable data
and national security challenges of the 21st
on the economic cost of attacks on government.
century for the United States and our allies.”2
Most top-down estimates of the scale of the issue
Dieter Braun
Can you hack it? Managing the cybersecurity challenge
4 See “Sex, lies and cyber-crime
surveys,” Dinei Florêncio
and Cormac Herley, Microsoft
Research, June 2011.
5 For more on the impact of
ever-increasing amounts
of data, see Big data: The next
frontier for innovation,
competition, and productivity,
McKinsey Global Institute,
May 2011.
6Ponemon Institute 2009
Annual Study: “Cost of a data
breach”; Symantec Internet
Security Threat Report 2010,
PricewaterhouseCoopers
Information Security Breaches
survey, 2010.
7US General Accounting Office,
“Testimony before the Subcommittees on Air and Land
Forces and Seapower and
Expeditionary Forces, Committee on Armed Services, U.S.
House of Representatives,”
GAO-10-478T, March 24,2010.
8McAfee and Center for
Strategic and International
Studies (CSIS), “In the
dark: Crucial industries
confront cyberattacks,” 2011.
43
are based primarily on questionable assumptions
suggests that attacks will continue to increase
that yield implausible figures4 and thus do not
in frequency and impact.
offer a sound basis for decisions about policy or
government interventions.
The taxonomy is helpful for understanding the
cybersecurity landscape, but to identify and
In this article, we propose a cybersecurity
plan for the most serious threats, government
taxonomy to help government leaders understand
leaders must be able to quantify the impact
the landscape, and a “value at risk” framework
of attacks. What, for example, was the cost of
that government leaders can use to prioritize and
the alleged loss of data relating to the F-35 Joint
focus on the most serious threats. It is our
Strike Fighter? What was the cost to the US
firm belief that cybersecurity is first and foremost
government of the release of its data by Wikileaks?
a management problem, not simply a technical
There is a lack of data, from private enterprise
problem, and therefore our taxonomy and frame-
or government, to help answer these questions.
work take a senior-management perspective.
Various estimates put the direct cost of a cyber-
We also outline four principles for a best-practice
attack on a large company at between $1.6 million
management response to cyberthreats. Adhering
and $7.2 million.6 At the extreme, the reported
to these principles will enable government to act
attacks on the F-35 program could compromise
as an effective protector of valuable assets.
the US government’s estimated $323 billion
development cost.7
Understanding the landscape and the
value at risk
Extrapolating such estimates into economy-wide
We have developed a six-part taxonomy of the
figures is problematic. How many attacks of
cybersecurity problem (Exhibit 1). The logic
this magnitude occur, and with what regularity?
behind our taxonomy is that an attack will occur
In a 2011 survey, more than 80 percent of
if an attacker has both the capability and the
critical-infrastructure providers reported being
incentive to strike at vulnerabilities in a target’s
the victim of large-scale cyberattacks or
assets. Today, attackers’ capabilities and
infiltrations.8 And many incidents that are de-
incentives are increasing—the former due to
tected go unreported, in part because reporting
technological developments and the latter
requirements vary by jurisdiction but also
due to the fact that more data and assets are now
because there are clear disincentives—especially
accessible online.5 The relative lack of trace-
for corporations—to report breaches.
ability means that attackers continue to feel little
threat of retribution. Meanwhile, targets’
We have used our taxonomy to create a relative
vulnerabilities are decreasing, but at a slower pace
value-at-risk analysis that offers government
than the increase in attackers’ capabilities, which
leaders insights into the likelihood and impact of
To identify and plan for the most serious threats, government
leaders must be able to quantify the impact of attacks
44
McKinsey on Government Autumn 2011
McKinsey on Government 2011
Cyber security
Exhibit 1 of 2
Exhibit 1
The taxonomy of cybersecurity helps government leaders
understand the landscape.
4
Targets
2 Capability
5
Vulnerability
6
Assets
1 Attackers
3 Incentive
Four groups of attackers1
a. Governments
b. Enterprises
c. Cybercriminals
d. Cyberterrorists or “hacktivists”
Capability
The ability to steal, hijack, impair,
or damage
Incentive
The motive to attack
1 Members
6 Assets
Four types of target entity
a. Data (such as IP2,
a. Public sector
customer
records, or
b. Private enterprise
classified national secrets)
c. Individuals
b. Systems, which vary in
d. Critical national infrastructure (CNI)
criticality from low (eg, informational Web sites) to high
5 Vulnerability
(eg, nuclear monitoring systems)
Can be technical (eg, lack
of a firewall) or human
(eg, employees being tricked
by phishing e-mails)
of multiple groups can work together in a single attack, in either a coordinated or an uncoordinated way.
property.
2Intellectual
attacks for each combination of attacker and
liberties—were informed by available data,
target (Exhibit 2). We see value at risk as a com-
our experience working in both the public and
bination of three elements: the attacker’s
private sectors, and extensive interviews with
capability, the asset’s vulnerability, and the rel-
leaders and IT specialists worldwide.
ative financial and nonfinancial costs of the attack.
Our estimates of relative costs—which take into
As the exhibit shows, the highest value at
account financial value but also factors such
risk applies to enterprise-held intellectual property
as national security and the protection of civil
(IP). IP is both extremely valuable and
Can you hack it? Managing the cybersecurity challenge
45
McKinsey on Government 2011
Cyber security
Exhibit 2 of 2
Exhibit 2
A value-at-risk analysis offers insights into where the most
serious threats are.
Estimation of value
at risk relative to
existing protection
An attack could be
consistent with the
attacker’s incentives
Low
Medium
High
Targets and assets
Attackers
Incentives
Public sector
Sensitive
Classified
information information Systems
Government
Strategic
advantage
Private
enterprise
Financial
gain
Cybercriminals
Financial
gain
Cyberterrorists,
hacktivists
Protest,
fun,
terror
Private enterprise
IP1
CNI2
Non-IP
data
Systems Systems
Individuals
Personal
information Systems
War
1Intellectual
2Critical
property.
national infrastructure (eg, power station).
vulnerable. It is easily stolen from electronic
concern: the threat from foreign governments to
systems, often without the theft even being
critical national infrastructure (CNI). Here, the
noticed. We estimate the value of the S&P 500’s
very high relative costs are dispersed across a
IP to be between $600 billion and $1.2 trillion.9
wide range of assets, locations, and sectors, thus
Governments have a critical interest in ensuring
reducing the risk of a catastrophic attack. Further-
the protection of IP due to its importance to
more, given that the primary threat to CNI is
both economic growth and the government’s
from other governments, an attack on CNI systems
own defense investments (for example, IP held by
could be construed as an act of war—and is
defense suppliers).
therefore less likely, as there are implicit retaliatory threats already in place.
9Based on discounted value
of research-and-development
expenditures and corroborated by the value of
intellectual-propertyrelevant intangible assets on
S&P 500 balance sheets.
Medium value-at-risk attacks should be a secondlevel priority. In the private sector, these
Another group of medium value-at-risk assets
are primarily attacks on non-IP assets, such as
consists of government systems and classified
customer data. Another medium value-at-risk
data. For example, we estimate the UK public
46
McKinsey on Government Autumn 2011
sector’s maximum loss from cyber-enabled
compass the entire spectrum of network-enabled
billion.10
assets, including those that may not tradition-
fraud to be $5.2
Although significant,
this figure is small in comparison with the value
ally be seen as at risk (such as systems that are not
at stake for private-sector IP losses. Furthermore,
online but that may be connected to the outside
most governments already invest heavily in
world through USB ports). The audit should also
reducing the vulnerability of internal data, thus
consider assets held by other organizations,
reducing the risk of attack.
especially suppliers. The alleged compromise of
the F-35 plans, for example, followed intrusions
A management challenge
into the systems of two or three contractors rather
Responding to the threat of cyberattacks requires
than the systems belonging to the Department
more than simply increasing spending on tech-
of Defense (DOD).11
nical defense mechanisms such as firewalls and
antivirus software. It requires senior-management
The second step is to conduct a risk assessment to
attention and a broad range of both technical
gauge the impact and likelihood of attacks on
and nontechnical capabilities.
each asset. The organization should estimate both
financial and reputational impact using a rel-
There are four principles that underlie a best-
ative scale (such as a simple low/medium/high).
practice management response to the cyber-
A distributed denial-of-service (DDOS) attack
security threat. They apply equally at any level of
on the Treasury Department’s Web site, for in-
government; the assurance questions for each
stance, may rank low for financial impact and
principle enable all managers to test the effective-
medium for reputational impact. Then, for
ness of their response.
each asset, the organization should estimate the
likelihood of a successful attack, again using
Define and prioritize risks
a relative scale—taking into account the attacker’s
“Do we have a clear understanding of our portfolio
incentive, the attacker’s capability, and the
of network-enabled assets and their respective
target’s vulnerability. For example, a DDOS attack
value at risk? Do we have sufficiently robust best
on the Treasury Web site may be rated high for
practices and expertise in-house to adequately
attacker incentive and capability and medium
protect them?”
for vulnerability.
To manage a cybersecurity program effectively,
The third step is to categorize assets according to
leaders must clearly define what they are
value at risk. Often two categories will suffice:
protecting and prioritize the threats they face.
lower value-at-risk assets (such as informational
We suggest a three-step process to define and
Web sites), which existing best practice should
prioritize risks.
cover, and higher value-at-risk assets (such as vital
The first step is to conduct an organization-wide
Some of these measures—more advanced security
systems), which require additional measures.
10McKinsey analysis based on
National Fraud Authority
Report, 2010, Her Majesty’s
Revenue and Customs data.
11“Computer spies breach
fighter-jet project,” The Wall
Street Journal, April 21, 2009.
asset audit. Leaders must identify the assets—
and vulnerability management, for example—
normally, the data and systems—that could be at
may involve building deep internal expertise or
risk from a cyberattack. The audit should en-
contracting for external assistance.
Can you hack it? Managing the cybersecurity challenge
47
Assign responsibility for cyberthreat mitigation
administrator rights or conducting simulations of
“Who are the named and empowered individuals
cyberattacks to test resilience).
responsible for our highest-priority networkenabled assets? Who is responsible for setting
Process and procedure. Procedures must be
and executing our cybersecurity strategy?
established to limit and mitigate the impact
What is the process for linking those individuals
of attacks. Responsibility in this area includes
so that we have a consistent and coordinated
ensuring that information about attacks is
approach that does not undermine the efficiency
available to leaders within the business (for
of our operations?”
example, predictive threat analysis based
Cybersecurity is a cross-functional issue.
and that data assets are suitably categorized
Organization-wide responsibility for policy should
(for example, working with business owners to
rest with a board member of the department
determine appropriate encryption levels).
on aggregating and analyzing e-mail headers)
or agency. Below board level, organizations should
clearly define responsibility for cybersecurity
People. Personnel policies must be in place
so that they can take a comprehensive series of
to minimize risk. This includes providing
actions to mitigate threats.
training to support the policy and regularly
testing compliance.
Leaders should assign responsibility for cybersecurity in three areas. Ownership of each
Supplementing the organization-wide policies,
area may be delegated to the relevant department
leaders should assign high-risk assets to
(for instance, the human-resources director
individuals to ensure that cybersecurity threats
could be accountable for people policies). The
are seen as a business risk rather than simply
three areas are as follows:
12 For some threats, addition-
ally assigning responsibility
by threat vector may be
appropriate—giving (often
technical) teams or individuals the responsibility of
tackling a particular
threat (for example, distributed denial-of-service
attacks across all Web sites
operated by a government
department).
an IT problem—for example, protection of health
records may be the responsibility of an oper-
Technology. Technology must be used to max-
ations manager. The risk owner, however, should
imum advantage to counter cyberattacks.
not be the same person who has business respon-
The organization must have the level of technical
sibility for an asset, so as to avoid conflicting
capabilities required and should prioritize
incentives or priorities: an owner of classified
technical spending in the areas of highest risk.
data, for example, may want to improve function-
Basic security best practices should be embedded
ality by combining data sets—at the expense
within the architecture (for example, limiting
of security.12
48
McKinsey on Government Autumn 2011
Manage the performance of those responsible
Develop a cyberattack contingency plan
“What is the basis for managing the performance
“What is our plan if we experience a significant
of those responsible for the protection of our
security breach? How will we communicate
network-enabled assets? How are we performing
internally and externally?”
against those assessments?”
Governments must have a robust response plan
Key performance indicators (KPIs) for the indi-
in the event of a successful cyberattack. A best-
viduals responsible for cybersecurity should
practice plan includes three phases: crisis manage-
include metrics mirroring the three areas for
ment, recovery, and postmortem.
threat mitigation, as follows:
The first phase is immediate crisis management,
Technological KPIs. These KPIs point to the
or how the organization should respond when
number and type of electronic touchpoints, both
it detects an attack. This should feature two ele-
internal and external, and highlight the quality of
ments: a communications response and a system
management of these connections. An example
response, both of which should be proportionate
of such a KPI is the number of days that elapse
to the impact of the attack.
between Microsoft issuing a critical software
update and the entire organization installing it.
The communications response, typically owned by
the head of public relations, should aim to give
Process and procedural KPIs. These KPIs can
stakeholders the information they need to know.
include data-policy indicators that measure the
This is particularly important for governments,
success of data segmentation and risk-assessment
given the likelihood of media and public interest.
activities (for example, the proportion of data
Key stakeholders will vary depending on the area
that are suitably encrypted) and operational-
of government attacked and should be identified
policy indicators that measure the implementation
in advance. For example, if there is an attack on a
success of policy (for example, the number of
system for sharing patient information among
attempted security-policy breaches within a
hospitals, the stakeholders may include hospital
certain period).
staff, nonhospital doctors, patients, dataprotection authorities, and other organizations
People KPIs. People KPIs measure the success
using similar systems. Immediately following a
rate of training, employee conformity to security
DDOS attack on its Web site, the United Kingdom’s
guidelines, or employee knowledge and use of
Serious Organised Crime Agency (SOCA) prompt-
best-practice e-mail behavior. They may be
ly issued a media statement describing the extent
assessed through spot tests.
of the attack and informing the public that it had
taken its Web site offline.13 Some news reports
To support these KPIs, organizations should put
characterized the attack itself as embarrassing for
in place a performance-management review
SOCA, but its communications response was
system and a set of incentives and consequences.
best practice.
Organizations should also ensure accurate
13“Soca website taken down
after LulzSec ‘DDoS attack,’”
BBC News, June 20, 2011.
flow of information on the frequency and type of
The system response, the main goal of which is
attacks, as well as on compliance with manage-
to terminate or ring-fence the breach, is normally
ment practices.
owned by the head of IT. Again, the response
Can you hack it? Managing the cybersecurity challenge
49
should be commensurate with the impact of the
response plan. The response plan should include a
attack. For example, an agency should not
board-level report that details the agreed-on
necessarily sever its IT communication links for
actions to be taken, with clear time frames and
a relatively low-level DDOS attack—but it may
owners for each. A successful postmortem
want to cut off access in the event of a significant
may include supporting a criminal investigation.
intrusion or hijack of its systems. Organizations
should codify and practice these measures
beforehand, not develop them on the fly. Once an
organization contains the breach, it should
Cybersecurity is a growing and ever-changing
initiate backup systems (such as a mirror Web
challenge. Government responses and policies
site). A crucial part of the system response should
regarding cybersecurity should not be static but
be to inform IT departments in other govern-
instead should be continually adapted and
ment organizations of the nature of the attack so
refreshed as new knowledge becomes available.
that they can upgrade their protection. For
While existing efforts to share knowledge
example, detection of a targeted phishing attack
among organizations (such as the forums hosted
on the DOD should trigger a warning to all other
by the US Office of Cybersecurity and Commu-
US government departments.
nications) are laudable, there is still too little
The second phase is recovery, which is pre-
resulting in organizations not being as well
knowledge sharing when it comes to cybersecurity,
dominantly a technical response that builds on
prepared for attacks as they could be. A greater
the immediate system response in the pre-
level of collaboration is particularly important
vious phase. The purpose is to repair damaged
among leading targets such as governments,
systems and data, fix the vulnerability that
advanced industries, and financial institutions.
led to the attack, and bring systems back online.
Within the public sector, sharing should happen
An ineffective recovery response leaves the
at many levels—not only shared information
target exposed to more attacks, which can lead to
and shared storytelling but shared action as
further embarrassment and cost.
well—reflecting the interconnectedness of
government departments.
The third phase is the postmortem, normally
enacted by the corporate risk owner. The purpose
of the postmortem is self-evaluation: to flush
out the causes of the attack and prevent a similar
one from recurring, to investigate attackers
and their motives and explore opportunities for
restitution, and to evaluate the success of the
John Dowdy is the global leader of McKinsey’s Aerospace and Defense practice. He is a director in the London office,
where Joseph Hubback and James Solyom are consultants and Dennis Layton is a principal. The authors wish
to thank Tucker Bailey, Assaf Egozi, Scott Gebicke, James Kaplan, Edward Lock, Chris Rezek, Giacomo Sonnino, and
Allen Weinberg for their contributions to this article. Copyright © 2011 McKinsey & Company. All rights reserved.